Evaluation of Security Scanners for Web Application Presented By: Sunint Kaur Khalsa (100875000) Sarabjeet Kaur Saini(6235987)

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Auto-test Tools: Sahi and Rational Robot Ting Yu Xia Liu University of Ottawa.
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
WSUS Presented by: Nada Abdullah Ahmed.
Reachwell – An Enterprise Asset & Workspace Management System
Using JavaServer Pages Harry R. Erwin, PhD CIT304/CSE301.
SOFTWARE PRESENTATION ODMS (OPEN SOURCE DOCUMENT MANAGEMENT SYSTEM)
Automating Bespoke Attack Ruei-Jiun Chapter 13. Outline Uses of bespoke automation ◦ Enumerating identifiers ◦ Harvesting data ◦ Web application fuzzing.
By Ben Pratt and Clint Forseth.  Ben Pratt ◦ Primary Role: Course Mgmt. Sys. Admin ◦ Secondary Roles: Printer Server Admin, Web Application Firewall.
EValid Getting Started. Agenda Introduction to eValid First experience of using eValid Recording and Site Analysis in eValid.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
Introduction to eValid Presentation Outline What is eValid? About eValid, Inc. eValid Features System Architecture eValid Functional Design Script Log.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Maintaining and Updating Windows Server 2008
The Premier Software Usage Analysis and Reporting Toolset Maximizing Value for Software Users.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
 Chirita Ionel  Application Security  OWASP Chapter board member.
Web Application Security Assessment and Vulnerability Assessment.
1 Archive-It Training University of Maryland July 12, 2007.
16.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 16: Examining Software Update.
Security Scanning OWASP Education Nishi Kumar Computer based training
CIS 375 Final Presentation Doug Code § Brad Lloyd § Michelle Zukowski.
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
GETTING WEB READY Introduction to Web Hosting. Table of Contents + Websites: The face of your business …………………………………………………………………………1 + Get your website.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
CAP6135 – Malware and Software Vulnerability Analysis By Tara Lingle and Orcun Tagtekin.
Overview of the ODP Data Provider Sergey Sukhonosov National Oceanographic Data Centre, Russia Expert training on the Ocean Data Portal technology, Buenos.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
Introducing ETIS n Express Term Internet Server is Express Term ‘on the Net’ n All the features of Express Term, plus –Complete control of your site look.
E.halFILE 2.2 New Application Features Session II.
A website is a collection of related web pages, images, videos or other digital assets that are addressed relative to a common Uniform Resource Locator.
Introduction to HP LoadRunner Getting Familiar with LoadRunner >>>>>>>>>>>>>>>>>>>>>>
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Software Evaluation Criteria Automated Assignment Applications RSCoyner 10/8/04.
Publish Calendars to the Web. CCUweb Presentation (10 Minutes) 1 Demonstration of published calendars (10 minutes) 2 Demonstration of importing calendar.
Watchfire AppScan Web Application Security Software Omen Wild September 2007.
CMSPro Omniversal Apps, Inc.. Application overview CMSPro is an extremely powerful, yet simple, metadata exploration and analysis tool for Business Objects.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
The Microsoft Baseline Security Analyzer A practical look….
Marcel Casado NCAR/RAP WEATHER WARNING TOOL NCAR.
MMS DresdenGermany – Dresden - Slide N°1Adolf Liepelt Final Project Review Newcastle upon Tyne, April 19, 2004 AESOP Platform.
CakePHP is an open source web development framework. It follows Model-View- Controller and is developed using PHP. IT is the basic for user to create.
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
Team Members Team Members Tim Geiger Joe Hunsaker Kevin Kocher David May Advisor Dr. Juliet Hurtig November 8, 2001.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Crystal Reports Training
ASP (Active Server Pages) by Bülent & Resul. Presentation Outline Introduction What is an ASP file? How does ASP work? What can ASP do? Differences Between.
Web Security Group 5 Adam Swett Brian Marco. Why Web Security? Web sites and web applications constantly growing Complex business applications are now.
CS779 Term Project Steve Shoyer Section 5 December 9, 2006 Week 6.
What…..Where…..Who…... Reachwell – An automated & workflow driven facility management system Know what assets you have. When, how and from whom was it.
Windows SharePoint Services Installation and Configuration.
1 Evaluation of Cooperative Web Caching with Web Polygraph Ping Du and Jaspal Subhlok Department of Computer Science University of Houston presented at.
5/29/2001Y. D. Wu & M. Liu1 Content Management for Digital Library May 29, 2001.
Maintaining and Updating Windows Server 2008 Lesson 8.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
DXL to PST Converter presents
Penetration Test Debrief
Introduction of Week 3 Assignment Discussion
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

Evaluation of Security Scanners for Web Application Presented By: Sunint Kaur Khalsa ( ) Sarabjeet Kaur Saini( )

Outline  Context  Goal and Scope of Study  Methodology  Evaluation Criteria  Evaluation of Candidate Tools  Conclusion and Recommendation

News…  Harvard Website attacked by Syrian Protesters  77 US Law Enforcement Websites hit in mass attack by “LulzSec” hacking group.  The website of World’s most popular Martial Arts Organisation “Ultimate Fighting Championship” hacked  …

Solution… Firewall ?

Blue Crystal Inc.  Web Application Development firm with a Work Force of 15 people  Develop web applications based on.Net Platform  Incepted the idea of giving security services to their clients after selecting a suitable tool  Wanted a tool with high functionality, low cost, low resource consumption and high vulnerability detection

Goal and Scope of Study  Goal  Select the most suitable tool for Blue Crystal as per their given requirements.  Scope  To conduct the evaluation of selected tools on the basis of High Impact and Low impact criteria.

Methodology Used  Test Cases for the Evaluation  Test websites provided by the vendors are used  Score given to each tool on the scale of 0-10 for the corresponding evaluation criteria  Weights have been assigned to the evaluation criteria  Final score = Where i= Evaluation Criteria wi = Weight of i th evaluation criteria si= Score of the tool corresponding to the i th evaluation criteria

High Impact and Low Impact Criteria

Evaluation Criteria High Impact Criteria Crawling and Parsing5 Vulnerability Identification5 Performance4 Cost and License5 Evaluation CriteriaLow Impact Criteria Ease of Installation3 Usability3 Scan Control Capability3 Reporting and Documentation3 Weighing Scheme

Tools Selected  Rational Appscan  A Product of IBM  Originally developed by Sanctum Ltd.  First released in 1998  HP WebInspect  A Product of HP  Originally developed by SPI Dynamics

Test Websites ToolHost Web Pages Operating System Web Server Application Language AppScanhttp://demo.testfire.net34 Win32 – Windows XP IISASP.NET WebInspecthttp://zero.webappsecurity.com 100Win32 – Windows XP IISASP.NET

Ease of Installation  This criterion considered the ease of acquisition and installation of the tool  Rational Appscan had a file of size 497 MB and took 5 hours for its installation  HP WebInspect took 2 hours for the installation of 641 MB file but we had to wait for 6 hours to get the key as that required domain verification.  WebInspect also required SQL server and there is no such requirement for Appscan Appscan = 8WebInspect = 6

Usability  Usability Criterion is a combination of  Ease of use  Efficiency  AppScan takes screenshots of the browser responses corresponding to the generated attacks  AppScan provides in depth description of the detected vulnerabilities including possible causes, technical description and fixing recommendation whereas WebInspect provides only recommendations  WebInspect creates macros to record testing steps during scan and automate repeated testing Appscan = 9WebInspect = 8

Usability…

Scan Control Capability  Evaluated the scan control capabilities of both the tools to find which tool is better for handling the scan.  Both tools provide operator with the ability to  Pause a scan  Restart the scan at a later time  Both tools provides the viewing the real-time status of running scans. This status could include information such as which tests are currently being run and the scan completion percentage. Appscan = 9WebInspect = 9

Reporting and Documentation  This criterion evaluates the tool on the basis of  Generation of reports in different formats  Comprehensiveness of the generated reports  Appscan can generate different types of reports  Security Report  Industry Standard Report  Regulatory Compliance Report  Delta Analysis Report  Template Based Report

Reporting and Documentation  Features of Appscan’s Report  Report was divided into different sections based on the URLs, where vulnerabilities have been encountered.  Reports consisted of tables, text and graphs and hence more readable and understandable  The reports by WebInspect comprised of a lot of text with definitions and explanation and less of graphs, tables. Appscan = 10WebInspect = 8

Report Generation in AppScan

Report Generation in WebInspect

Crawling and Parsing  Crawling is an activity by which the scanner browses various web elements like cookies, forms, parameters, links etc looking for vulnerabilities  Parsing is defined as crawling for the various types of contents like HTML, ActiveX objects, Java Applets, Java Scripts, XML etc  Both the tools have automated crawling  In manual configuration, user is given the option  Specifying a request delay,  Maximum crawl depth  Have concurrent sessions

Crawling and Parsing  WebInspect has a feature which shows the steps the scanner took to reach a specific vulnerability, pointing to the specific element.  It is good if we want to retest certain flaws and to see how the scanner is working on it  WebInspect gives the feature to specify the request delay which is of interest to Blue Crystal Inc. as it might help them to use the bandwidth wisely Appscan = 9WebInspect = 10

Vulnerability Assessment  This criterion evaluates the total vulnerabilities which have been found by the web scanners on their respective test cases.  In order to find the vulnerabilities on the test websites the number of attacks sent by AppScan 18,634 on 34 pages as compared to 19,968 on 100 pages of WebInspect.  With three times the size of the test website WebInspect generates less attacks and this results in exposing less vulnerabilities.

Vulnerability Identification  Appscan exposed 120 vulnerabilities as compared to 272 vulnerabilities exposed by WebInspect. Here it is worth mentioning that the size of WebInspect’s test case is thrice as that of Appscan’s test case.  The various types of attacks detected by both the tools are  SQL Injection  Cross Site Scripting  Buffer Overflow  File guessing Etc… Appscan = 9WebInspect = 7

Performance  This criterion covers the time in which the tool completes the scan and the resources utilized during the scan  Appscan completed the scan of website with 34 pages in 31 minutes where as WebInspect completed the scan of 100 pages in 15 minutes showing the better performance of WebInspect  The minimum system requirements of Appscan are  2.4GHz processor  2GB RAM  30GB of free disk space  The minimum system requirements for WebInspect are  1.5GHz processor  2GB of available RAM  10GB of free disk space Appscan = 7WebInspect = 8

Cost and License  Cost = Training cost + License Cost  The Training cost is considered the same for both the tools as both of them have online tutorials and quick start up kits. Appscan = 8WebInspect = 7 WebInspect Annual Audit License: This licence type allows access to client’s partner portal (They have the ability to scan unlimited customers on any IP in their environment) + Annual maintenance + customer support + access to daily updated vulnerability checks + Additional Overhead for each additional user $ 20,000 IBM Rational App Scan Standard Edition + SW Subscription & Support 12 Months $19,700

Score Earned by each Tool

Total Score of each Tool Evaluation Criteria(i)Weight (wi)AppScan(si)WebInspect(si) Ease of Installation3 8 6 Usability398 Scan Control Capability399 Reporting and Documentation 3108 Crawling and Parsing5910 Vulnerability Identification597 Performance478 Cost and License587 Total Score266245

Conclusion and Recommendation  Rational AppScan is a clear winner and hence a better tool to fulfill the requirements prescribed by Blue Crystal Inc.  Number of attacks sent by AppScan were more as compared to WebInspect for exposing the vulnerabilities in the test website.  AppScan provides in depth description of the detected vulnerabilities including possible causes, technical description and fixing recommendation whereas WebInspect provides only recommendations, required from development point of view.

References   ml 